Results 81 to 90 of about 22,218,864 (289)
Background Globally, a surge in electronic cigarette (e-cigarette) use has been observed in recent years, with youth being the most susceptible group.
Abdullah Alnajem +8 more
doaj +1 more source
ABSTRACT The impressive growth in the global market for plant‐based foods has a direct impact on the food industry, requiring greater efforts in product reformulation for the replacement of animal‐based ingredients, including proteins. The replacement of animal‐derived proteins frequently applied as emulsifiers in food formulations, for example ...
Thais C. Brito‐Oliveira +2 more
wiley +1 more source
Comments to the Federal Trade Commission on the CAN-SPAM Rule Review, 16 C.F.R. Part 316, Project No. R711010 [PDF]
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316. The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect ...
Ford, Roger Allan
core +1 more source
Abstract Dental microwear texture analysis (DMTA) has emerged as a valuable method for investigating the feeding ecology of vertebrates. Over the past decade, three‐dimensional topographic data from microscopic regions of tooth surfaces have been collected, and surface texture parameters have been published for both extant and fossil species.
Mugino O. Kubo +4 more
wiley +1 more source
The Digital Signature Scheme MQQ-SIG [PDF]
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given
Faugère, Jean-Charles +6 more
core +1 more source
Abstract Dental microwear texture analysis (DMTA) has become a well‐established method for dietary inference and reconstruction in both extant and extinct mammals and other tetrapods. As the volume of available data continues to grow, researchers could benefit from combining published data from various studies to perform meta‐analyses.
Daniela E. Winkler, Mugino O. Kubo
wiley +1 more source
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +1 more source
This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.
A. Kato, M. Kanda, S. Kanno
core
SSTR4 illetve capsaicin receptor mediált neurogéngyulladás gátló gyógyszerhatóanyagok optimalizációja, karakterizációja és farmakofor model generálása = Optimization, characterization and pharmacophore modeling of SSTR4 or capsaicin receptor mediated neurogenic inflammation inhibiting drug candidates [PDF]
A Klinika II fázisban lévő SSTR4 receptoron ható TT-232 heptapeptid olyan új, eltérő szerkezetű származékait állítottuk elő, ahol a biológiai hatás szempontjából fontos aminosavakat egyrészt egy pirazinon gyűrűvel ciklizáltuk, másrészt egy flexibilis ...
Hollósy, Ferenc +7 more
core
ABSTRACT Autistic individuals exhibit altered perceptual and visuomotor behaviors, potentially due to reduced cortical specialization. The current study focuses on handedness, a robust marker of cerebral specialization, which is less right‐biased in autism.
Emily Fewster +2 more
wiley +1 more source

